|Publication number||US6829340 B2|
|Application number||US 10/414,105|
|Publication date||Dec 7, 2004|
|Filing date||Apr 16, 2003|
|Priority date||Apr 18, 2002|
|Also published as||CA2447105A1, DE60307790D1, DE60307790T2, EP1473915A1, EP1473915B1, US20030198326, WO2004098165A1|
|Publication number||10414105, 414105, US 6829340 B2, US 6829340B2, US-B2-6829340, US6829340 B2, US6829340B2|
|Original Assignee||Tsung-Hsing Wei|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (9), Referenced by (13), Classifications (27), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of the Present Invention
The present invention relates to a new method of protecting telephone user's privacy from disturbance, and more particularly to a method of making a common phone device with two phone numbers separately used for people communication of working and private time respectively.
2. Description of Prior Art
Life with better personal privacy is very important for modern people. Most of people divided private and working territory separately.
Recently, with such a convenient and powerful communicating device, mobile phone rapidly becomes the most important tool or equipment for modern life. Modern people cannot live without his mobile phone in a single day. While people's good private life were heavily interrupted by the mobile phones. The mobile phone can penetrate into any space at any time regardless of any distance.
Due to improve personal privacy, some people maybe buy two or more phone numbers (accounts) for his one phone device. With two SIM (Subscriber Identity Module) chips, people may draw and change different SIM chip for his different time interval and different personal relationship's communication on one phone.
Otherwise, many other people maybe buy two or more phone devices together with different SIM chip equipped directly. These different phone devices are separately used for his different time interval and different personal relationship's communication. Thus, it is very funny and troublesome for a person carrying two or more phone devices with him just for separately used for different people communication or for working and private time respectively.
This invention is to develop a new simplified method to make telephone user have two or more phone numbers on one phone device for his working and private times respectively. With this new invented method, phone user's privacy improved and the cost for phone devices decreased.
The primary object of the present invention is providing a method to have user's original phone number be substituted or masked by a virtual created number. By this way, the present invention makes one phone device with two or more phone numbers that are separately used for communicating with user's working and private territories respectively.
The second object of the new invention is providing a service method to let registered member user may set his new mask number in opened or closed state at any time according to user's demand. With this service, the registered member user may divide his private time and working time separately very easy.
The third object of the new invented service method is to let a registered member user use his original phone number and mask phone number arbitrarily, separately, and independently. When the registered member user set his mask number opened, his original number is masked. At the moment, the connected recipient's phone device will show caller's mask number instead of his original number.
The connected recipient don't see caller's original number and keep the member user's privacy good. When the registered member user set his mask number closed, his original number is exposed and any contacted recipient's phone device will show the caller's original number again.
The fourth object of the new invented service method is to improve registered member user's privacy and ensure better life. When the registered member user set his mask number closed, the only way to communicate with the user is the original phone number. Any people want to contact with the user must dial his original number. At this time, any caller dialing user's mask number will not touch the user temporarily. With this new invented method the masked phone service will protected member user's privacy firmly.
FIG. 1 is a flow chart of the masked phone service of this invention to illustrate how to mask user's original number and protect user's privacy.
FIG. 2 is a flow chart to illustrate how the masked phone service of this invention operated.
The present invention disclosed a new method of masked phone service with user's mask phone number. The key point is a computer controlled management system (we defined it as “Masked Phone Service System”) that creates a virtual phone number depending on and to substitute member user's original phone number. This substitutive number (we called it “mask phone number”) will correspond to and mask user's original phone number in the service system operation.
On the point of view of “Masked Phone Service System”, the phone user's mask phone number are created depend on original phone number. Both of 2 numbers are identifiable, interchangeable and corresponding mutually. In the actual telecommunication service system operation, there is only one original number operated.
On the point of view of phone users in the real world, the original phone number and the newly given mask phone number are two independent numbers, which have same shape and same function to dial, and used for different territories of people communication. The users cannot imagine how interchangeable between these two numbers.
When a phone user use original number to communicate other people (set mask number closed), the “Masked Phone Service System” sent message through original phone number, of course. While the user use registered mask number to communicate other people (set mask number opened), the “Masked Phone Service System” will revert the member user's mask number to corresponding original number immediately, sent message through original phone number, as usual. By the method of new invention, the user's original number was masked not disabled temporarily. The member user may apply two different phone numbers separately on one phone device.
Please see our FIG. 1, it explains the user's procedure of operating a mask phone number to mask user's original number and protect user's privacy.
When a Phone user want to use the present invention “Masked Phone Service”, the user must enter “Masked Phone Service System” (20) which constructed by a telecommunication operator (11). A new user (21) must sign up to be member user and register his original phone number (22) currently used. “Masked Phone Service System” (20) will create a mask number (23) depend on user's original phone number.
Before the new member user set his new mask number to be opened (24), any message call out from his phone device will be operated through his original phone number as usual (step 32).
After the new member user of “Masked Phone Service System” decide to start using the “Masked Phone Service” (24) and set his mask number be opened (step 25), the member user communicate outside through his mask number (27). The mask number musk or substitute his original number temporarily (28). All messages call in and out seems to operate through the mask number (29). At this time interval, the certain working territory of people, which communicated user with only mask number, may contact user fluently without any obstacle.
At a certain time of interval, the member user set his mask number closed (25), and the mask number is shut down (26). It means that the user don't want use his mask number to communicate outside, any message through the mask number will be stopped. In the meantime, the user's operating phone number reverts to the only one original number as usual (32). AT this time interval, all messages through user's original phone number may contact user as usual. Any messages through user's mask number will not contact user temporarily.
Please see the FIG. 2. It explains how the masked phone service operated. When a phone user dial a recipient's phone number (10), the “Masked Phone Service System” (20) will automatically identify that is the dialer a member user of the new service system (30)?
If the dialer is not a member of the new service system, the system will send message with dialer's original number to recipient (31). The recipient's phone device will show dialer's original phone number (80). If the dialer is identified to be a member user (30) of “Masked Phone Service System”, but the mask phone number set to be “closed” state (30), the system will also send message with dialer's original number to recipient (31). The recipient's phone device will also show dialer's original phone number (step 80).
If the dialer is identified to be a member user of “Masked Phone Service System”, and the mask phone number set to be “opened” state (40), the system will transfer member dialer's original number to his registered mask number automatically and send message with dialer's mask number to recipient (41). The recipient's phone device will show dialer's mask phone number (step 80). The member dialer's original number masked.
The “Masked Phone Service System” then identifies automatically that is the recipient's phone number a mask number (50)?
If the recipient's phone number is identified not a mask number, that means the recipient is not a member user of the new “Masked Phone Service System”. The system will send message to recipient's original phone number (70), and recipient's phone device will show dialer's mask phone number or original number (80) according to dialer's setting state. Both dialer and recipient can be connected and communicated each other (90).
While the system confirmed that the recipient's phone number is a member's mask number (50), then the system check that is the recipient's mask number set “closed” state (60)?
If the recipient's mask number is set “closed” state, it means that the recipient is at his private time, the communication channel of this number closed. To ensure recipient's privacy (61), the “Masked Phone Service System” will answer dialer that recipient's phone device is shutdown state (62). The message through recipient's mask number will be stopped temporarily. Member recipient's privacy ensured.
If the recipient's mask number is set “opened” state (60), it means that the recipient is not at his private time, he would like receive messages through mask phone number. The system will revert recipient's mask number to registered original number automatically (63) and send message to recipient's original phone number (70), and recipient's original phone device will show dialer's mask phone number or original number according to dialer's setting state (step 80). Both dialer and recipient can be connected and communicated each other (90).
By this method, when a member user in his personal private time and private space, he may set his mask number be “closed” state. Thus, all working territory people's communication through this mask or substitutive phone number will be stopped temporarily. The member user's privacy protected. While at this time, the member user's phone device is not shut down in fact. The member user's family and his personal friend may contact him through original private number as usual.
As described above, in the other specified time of interval, the member user set his mask number be “opened” state, the member user's original number masked temporarily. And, all working territory people's communication through this mask phone number operated fluently, no obstacle. At this same time, the member user's family and his personal friend may contact him through original number free as usual.
As described above, the new invented “Masked Phone Service” will make user's one phone device equipped with two phone numbers and used for two different territorial communications. The user's privacy protected while he need not shut down his phone device.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5590184 *||Mar 3, 1995||Dec 31, 1996||Lucent Technologies Inc.||Communications privacy protection system by replacing calling party number with non-assigned number|
|US5784444 *||Dec 1, 1994||Jul 21, 1998||Lucent Technologies Inc.||Method and apparatus for providing personal calling identification at remote locations|
|US5832072 *||Nov 27, 1996||Nov 3, 1998||Bell Communications Research, Inc.||Communication network with hidden calling number capability|
|US5864612 *||Oct 1, 1996||Jan 26, 1999||Bell Atlantic Network Services, Inc.||Caller selective identification for telephone calls|
|US5892821 *||Dec 13, 1996||Apr 6, 1999||Bell Sygma Inc.||Virtual wide area centrex|
|US5901209 *||Dec 16, 1996||May 4, 1999||Intervoice Limited Partnership||Caller ID substitution for selected telephone callers|
|US5940515||Aug 13, 1996||Aug 17, 1999||Nokia Mobile Phones Limited||Secure dialing in mobile telephone system|
|US6370519||Jul 22, 1999||Apr 9, 2002||Samsung Electronics Co., Ltd.||Method for storing and displaying telephone numbers of communication terminals|
|US6449351 *||Oct 28, 1999||Sep 10, 2002||Ameritech Corporation||Method and system of providing caller identification with name|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8121625 *||Sep 8, 2005||Feb 21, 2012||John Terrence Carroll||System for enabling communication between computers and mobile telephones|
|US8332535 *||Jul 9, 2008||Dec 11, 2012||International Business Machines Corporation||System and method for providing privacy and limited exposure services for location based services|
|US8966114||Sep 7, 2012||Feb 24, 2015||Nng Llc||System and method for providing privacy and limited exposure services for location based services|
|US9282186||Sep 18, 2013||Mar 8, 2016||NobelBiz, Inc.||System and method for modifying communication information (MCI)|
|US9288317||Jan 25, 2011||Mar 15, 2016||NobelBiz, Inc.||System and method for modifying communication information (MCI)|
|US9332118 *||Mar 25, 2015||May 3, 2016||CallerReady LLC||System and method for call distribution|
|US20070003036 *||Jun 28, 2005||Jan 4, 2007||International Business Machines Corporation||Identifying a caller who uses an unrecognized terminal|
|US20080089501 *||Oct 16, 2006||Apr 17, 2008||Lucent Technologies Inc.||Caller ID spoofing|
|US20080159502 *||Dec 28, 2006||Jul 3, 2008||General Instrument Corporation||Method and Apparatus For Providing Caller Identification Information|
|US20080280639 *||May 10, 2007||Nov 13, 2008||Merav Alfia||Multiple Line Cellular Telephone With Individual Features|
|US20090075680 *||Sep 8, 2005||Mar 19, 2009||Forgetmenot Software Limited||System for Enabling Communication Between Computers and Mobile Telephones|
|US20100009657 *||Jul 9, 2008||Jan 14, 2010||International Business Machines Corporation||System and method for providing privacy and limited exposure services for location based services|
|US20150281435 *||Mar 25, 2015||Oct 1, 2015||CallerReady LLC||System and Method for Call Distribution|
|U.S. Classification||379/142.14, 379/142.17, 379/245, 379/142.02, 379/142.06, 379/247, 455/415|
|International Classification||H04Q7/38, H04M1/667, H04M1/274, H04M3/42, H04M1/725, H04M1/57, H04M15/06|
|Cooperative Classification||H04M3/42229, H04M3/42059, H04M2203/2072, H04M2242/22, H04M15/06, H04M3/42102, H04M2203/2044, H04M3/4234, H04M3/42238, H04M1/571, H04M3/42008|
|European Classification||H04M3/42M, H04M15/06|
|May 23, 2008||FPAY||Fee payment|
Year of fee payment: 4
|Jul 23, 2012||REMI||Maintenance fee reminder mailed|
|Dec 7, 2012||LAPS||Lapse for failure to pay maintenance fees|
|Jan 29, 2013||FP||Expired due to failure to pay maintenance fee|
Effective date: 20121207